Encryption: Its Algorithms and Future

Pranavnath
Updated on 03-May-2023 11:34:11

401 Views

Encryption is a method to protect the incoming message by coding the plain text into an encoded one called the cipher text. The main ideology behind encryption is to protect the data transmitted to be secured from any type of attack. There are typically two types of encryptions namely symmetric and asymmetric encryption methods. In this, the encryption algorithm comes under the components of encryption. Decryption is a process of getting the plain text from the encoded text using an encryption key. Encryption Cryptography involves both encryption and decryption, to prevent the data from unauthorized access. The Components of Encryption ... Read More

Golang Program to Depict Short Variable Declaration Operator

Akhil Sharma
Updated on 03-May-2023 11:33:03

143 Views

In this golang article, we will write Go language programs to depict short variable declaration operator using var keyword and variable declaration. In shorthand variable, initialization is done at the time of declaration where it’s not necessary in var keyword. Here, we will use a string method, as well as a count variable method to depict short variable declaration. Algorithm Step 1 − Import the required packages in the program Step 2 − Create a main function Step 3 − In the main use short variable declaration to create strings Step 4 − Print the strings created via shorthand ... Read More

Evolution of Cloud Computing

Pranavnath
Updated on 03-May-2023 11:31:44

29K+ Views

Cloud Computing provides the facility to a wide range of services stored in the cloud or Internet. The Services provided by cloud computing are computer resources, data storage, applications, servers, developmental tools, and networking protocols. It is most popularly used by IT firms and for business requirements. The term “Cloud Computing” was proposed in the year 1950s that gives internet-related services and it emerged from distributed computing to the current technology called cloud computing. Amazon, Google, and Microsoft are some examples of cloud services. Cloud Computing Cloud computing is the services provided on the Internet to store a vast amount ... Read More

Create an Empty File in Go

Akhil Sharma
Updated on 03-May-2023 11:31:20

687 Views

In Golang, os and io packages are used for performing various file-r operations like editing, copying, creating, and deleting. In this article, we are going to see three different Examples to create an empty file. In the first Example we will use os.Create from the os package, in the second Example we will use WriteFile function from ioutil package is used and in the third Example we will use NewWriter function from bufio package is used. Syntax os.Create() This function comes from the os package. It helps in the creation of a new file. The filename is given as ... Read More

GPRS Architecture in Wireless Communication

Pranavnath
Updated on 03-May-2023 11:23:42

2K+ Views

Wireless Communication Wireless communication is the process of sending voice and other forms of data without the installation of cables and wires. Radio communication systems are used at earlier stages of wireless transmitters, later then modulation is used within transmitters that use electromagnetic signals to send voice, data files, video, or other media signals over the network. Wireless networks connect the network devices to a laptop, tablets, mobile phones, and other support devices to access the internet connection thereby eliminating the physical cabling of wires. After the invention of 4G standards in cellular networking, wireless applications are mostly by the ... Read More

Efficiency of CSMA/CD

Pranavnath
Updated on 03-May-2023 11:17:53

2K+ Views

CSMA/CD (Carrier Sense Multiple Access/ Collision Detection) is a networking protocol more precisely it is an Access protocol its standard is IEEE802.3 and used to broadcast links, widely used in Ethernet network systems. It is very effective and easy the implement. But the efficiency of CSMA/CD is an important factor that decides its usage for different types of network topologies and environments. In this article, we will explore the efficiency of CSMA/CD in terms of its capability to handle network congestion and minimize the number of collisions. Working(Basics) of CSMA/CD CSMA/CD works by detecting whether the broadcast channel is idle ... Read More

Read Lines from an Existing File in Go

Akhil Sharma
Updated on 03-May-2023 10:53:16

183 Views

In Go programming language, Bufio and io package functions will be used to read the text from the given file. In this article, we will use three Examples to read lines from the existing file. In the first Example, we will use NewReader function from the bufio package, in the second Example we will use ReadFile function from ioutil package and in the third Example we will use file.Read function respectively. Syntax func Split(str, sep string) []string Split() function is used to split a string through a provided separator. This function is present in strings package and it accepts ... Read More

Read Entire Text from an Existing File in Golang

Akhil Sharma
Updated on 03-May-2023 10:50:43

628 Views

In this Golang article we will use ReadFile function from the io/ioutil package, NewScanner function from the bufio packageand as well as NewReader function from the former package respectively to read entire text from the xis=sting file. Syntax bufio.NewReader() This function belongs to Go's bufio package. The primary goal of this function is to read the data in larger chunks instead of line by line and store in buffer. The io.reader and buffer size are passed as arguments in this function. os.Open() This function is a part of os package. It is used to open a file to ... Read More

Fiber Optics and Its Types

Pranavnath
Updated on 03-May-2023 10:39:37

2K+ Views

Fiber optics is one of the technologies used to transmit data through thin glass or plastic fibers. It is mostly used in communication channels like telephone, televisions, and the Internet. Core and cladding are two parts of fiber optic cable. The cladding reflects the light to the core, thus preventing the loss of signal. Fiber optics are mostly used in medical and industry services. In the medical field, it is used for endoscopies, to view and treat internal organs. In industries, it is used in controlling temperature, pressure, and vibrations. Fiber Optics and its Types Definition Fiber optics is defined ... Read More

Classification of MAC Protocols

Pranavnath
Updated on 03-May-2023 10:34:09

20K+ Views

In ISO OSI layers there are seven layers, and each layer has its characteristics and its protocols. The most important second layer from the bottom is the data link layer. In this data link layer consists of two different layers and MAC is one important layer. MAC is the Medium Access Control layer. MAC layer helps to reduce the collision while transmitting the data. The main functionality of the MAC layer will act as a medium to access the shared resources in the network. So it has the control accessibility of nodes when they are in a shared medium. MAC ... Read More

Advertisements